卵巢筛查要做什么检查| 更年期提前是什么症状| o型血的父母是什么血型| 气血不足什么引起的| b超涂的液体是什么| 凉皮加什么才柔软筋道| 白醋和小苏打一起用起什么效果| 曹仁和曹操什么关系| 什么人不宜吃石斛| 猎奇是什么意思| 小马过河的故事告诉我们什么道理| 掌中宝是什么肉| 醋是什么颜色| 处女座和什么座最配对| 力排众议是什么意思| 口腔发苦是什么原因| 鳌鱼是什么鱼| 肺大泡是什么病| 两鬓长白发是什么原因| 什么止咳效果最好最快| 肛门下坠吃什么药| 7月7日是什么日子| vain是什么意思| lotus是什么车| wifi用户名是什么| 为什么要分手| 一什么山泉| 1983属什么| k是什么| 香菜炒什么好吃| 夏天吃什么解暑| 榴莲什么时间段吃最好| 皮肤黑的人穿什么颜色的衣服显白| 血压高是什么原因引起的| 胆固醇高不可以吃什么食物| 脸上为什么会长痣| 莲子是什么| 盗汗什么意思| 黄芪长什么样子的图片| 市人大副主任什么级别| 男人下面出汗是什么原因| 咳咳是什么意思| 硬度不够吃什么中成药| 肠炎吃什么药好得快| 指背煞是什么意思| 梦见借给别人钱是什么意思| ube手术是什么意思| ikbc是什么牌子| 黄瓜有什么营养价值| 金屋藏娇定富贵是什么生肖| 吃生姜对身体有什么好处和坏处| 什么是优质碳水| 智齿有什么用| 没睡好头疼是什么原因| 乸是什么意思| 天秤座男生和什么星座最配| 什么情况下要打狂犬疫苗| 4月19号是什么星座| 血友病是什么| 什么心什么目| 好梦是什么意思| 庚寅五行属什么| 点天灯是什么意思| 过氧化氢弱阳性什么意思| 低血压低是什么原因| 跖疣用什么药| 肝内钙化灶是什么意思| pm2.5是什么| 稻花鱼是什么鱼| 聪明的女人是什么样的| 脑梗什么意思| 什么鱼没有刺| 偏头疼是什么原因| 为什么订婚后容易分手| 50肩是什么意思| 为什么老打哈欠| 心率快是什么原因引起的| 检查肝挂什么科| 有血流信号是什么意思| 冲锋陷阵是什么生肖| 十二指肠溃疡是什么原因引起的| 白带带血是什么原因| 什么鱼没刺| 骨折吃什么补品| 李世民是什么民族| 吃百家饭是什么意思| 拉屎为什么是黑色的| 梦见抓蝎子是什么意思| pearl是什么意思| 北斗星代表什么生肖| 品保是做什么的| 比宇宙还大的是什么| 重阳节吃什么| 打嗝放屁多是什么原因| cc是什么牌子| 脸痒痒用什么方法可以缓解| 胚胎是什么| 饭后胃胀是什么原因导致的| 盐酸利多卡因注射作用是什么| 菟丝子是什么| 局灶肠化是什么意思| 19年是什么年| 神经内科看什么病| 黄墙绿地的作用是什么| 神经紊乱吃什么药| exp是什么意思| 10月1日什么星座| 直肠肿瘤手术后吃什么| 广西属于什么地区| 水准仪是测量什么的| ol是什么| 目瞪口呆是什么生肖| 什么样的女人最吸引男人的心| 电视为什么打不开| 摸鱼是什么意思| ket是什么| 腰椎骶化是什么意思| 硫磺是什么东西| 经常手淫会导致什么| 吃什么增强记忆力| 尿结石挂什么科| 绿豆和什么一起煮好| 特殊是什么意思| 嘿是什么意思| 什么的河流| 青蛙吃什么食物| 桥本甲状腺炎吃什么药| 胃酸不能吃什么食物| 比萨斜塔为什么是斜的| 苦瓜炒什么好吃| 独活主治什么病| 什么是m属性| 办理生育津贴需要什么资料| 公子是你吗是什么歌| 闭关修炼是什么意思| 大腿两侧疼痛什么原因| 维生素c什么时候吃最好| 抽筋是什么原因引起的| 磕碜是什么意思| 左肾盂分离是什么意思| 佛法是什么意思| 牙齿疼是什么原因引起的| 黑洞是什么东西| 你喜欢吃什么用英语怎么说| 拜忏是什么意思| 甲状旁腺激素高吃什么药| 牙龈起包是什么原因| 247什么意思| 教师编制是什么意思| 银屑病用什么药膏| 性向是什么意思| 牙齿痛用什么药| 0和1什么意思| 可孚属于什么档次| 螃蟹的血是什么颜色的| 发炎不能吃什么东西| 四面楚歌是什么意思| 1997属什么| 窦性心律过缓吃什么药| 梦见蛇是什么征兆| 狗嚎叫有什么预兆| 维和部队是干什么的| 唐筛主要检查什么| 什么是碳水化合物食物| 梦见蜂蜜是什么意思| 吃什么不便秘可以通便| 无中生有是什么生肖| 福祸相依什么意思| 东北是什么气候| 卒中中心是干什么的| 霉菌性阴道炎用什么药效果好| 川字五行属什么| 混剪是什么意思| 民不聊生是什么意思| 甲沟炎是什么原因引起的| 下面流出发黄的液体是什么原因| 什么是碳水食物有哪些| 女人什么血型最聪明| 屁多是什么情况| 廿读什么| 冰酒是什么酒| 玛丽珍鞋是什么意思| 猪血不能和什么一起吃| 益五行属什么| 什么是线粒体| 什么是用户名| 肚子疼吃什么药管用| 生理曲度变直什么意思| 什么叫精神病| 降真香是什么| 什么长什么去| daily什么意思| rsa胎位是什么意思| 屋尘螨和粉尘螨是什么| 肩胛骨缝疼挂什么科| 姐姐的女儿应该叫什么| 宿醉是什么意思| 大脖子病有什么症状| 什么是肝性脑病| 玩手机头疼是什么原因| 早上打嗝是什么原因呢| 巫山云雨是什么意思| 诏安是什么意思| 艮什么意思| 木棉花什么时候开花| 怀孕1个月有什么症状| 天蝎女和什么星座最配| 脂肪肝喝什么茶最好最有效| 疑神疑鬼是什么意思| 茉莉花长什么样| 至死不渝下一句是什么| 龙凤呈祥是什么生肖| 104是什么意思| 小腹变大是什么原因| 右附件区囊肿是什么意思| 手指爆皮是什么原因| 小孩子长白头发是什么原因| 腰椎穿刺是检查什么的| 嗡阿吽是什么意思| 杏有什么作用和功效| 皮肤发痒是什么原因| 茄子是什么意思| 耐人寻味是什么意思| 吃人参果有什么好处| 叒字什么意思| 血糖高初期有什么症状| 前庭功能减退是什么原因| 刷屏是什么意思| 唇炎去药店买什么药| 杭字五行属什么| 血液粘稠吃什么药| 请人原谅说什么| 脱发是什么原因引起的| 1.16是什么星座| 猕猴桃什么季节成熟| 坐月子吃什么水果好| 最难写的字是什么| 为什么想吐却吐不出来| 杵状指常见于什么病| hcg是检查什么的| 脾胃虚寒吃什么食物| 淀粉样变性是什么病| 小便有点黄是什么原因| 走马观花是什么生肖| 不什么其什么| 什么是特应性皮炎| 恃势之刑是什么意思| 化疗病人吃什么好| 登高是什么意思| 睡觉爱做梦是什么原因| 氢氧化钙是什么东西| 口腔白斑是什么病| dan是什么单位| 嫦娥奔月是什么节日| 96120是什么电话| 痰栓是什么意思| 什么案件才会出动便衣| 脚趾头长痣代表什么| 上上签什么意思| 为什么头出汗特别多| 什么是双飞| 什么病不能吃西洋参| 激素六项挂什么科| 脸颊红是什么原因| 百度Jump to content

腔隙灶是什么意思

From Wikipedia, the free encyclopedia
(Redirected from Unix-to-Unix Copy)
UUCP
Original author(s)Mike Lesk
Developer(s)AT&T Bell Laboratories
Initial release1979; 46 years ago (1979)
Operating systemUnix and Unix-like, DOS, OS/2, OpenVMS, AmigaOS, classic Mac OS, CP/M
TypeCommand
Internet history timeline
百度 对于存在重大消防安全隐患的商场市场,在依法处理的基础上,要提请属地政府和有关部门纳入升级改造或疏解外迁计划;对于已经列入疏解计划的专业性区域市场,要用足用好“查、改、关、封、拘、罚”等执法手段,该关停的关停、该查封的查封、该移送函告有关职能部门的移送函告,以强力执法推进疏解工作。

Early research and development:

Merging the networks and creating the Internet:

Commercialization, privatization, broader access leads to the modern Internet:

Examples of Internet services:

UUCP (Unix-to-Unix Copy)[1] is a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers.

A command named uucp is one of the programs in the suite; it provides a user interface for requesting file copy operations. The UUCP suite also includes uux (user interface for remote command execution), uucico (the communication program that performs the file transfers), uustat (reports statistics on recent activity), uuxqt (execute commands sent from remote machines), and uuname (reports the UUCP name of the local system). Some versions of the suite include uuencode/uudecode (convert 8-bit binary files to 7-bit text format and vice versa).

Although UUCP was originally developed on Unix in the 1970s and 1980s, and is most closely associated with Unix-like systems, UUCP implementations exist for several non-Unix-like operating systems, including DOS, OS/2, OpenVMS (for VAX hardware only), AmigaOS,[2] classic Mac OS, and even CP/M.

History

[edit]

UUCP was originally written at AT&T Bell Laboratories by Mike Lesk.[3] By 1978, it was in use on 82 UNIX machines inside the Bell system, primarily for software distribution. It was released in 1979 as part of Version 7 Unix.[4]

The first UUCP emails from the U.S. arrived in the United Kingdom in 1979 and email between the UK, the Netherlands and Denmark started in 1980, becoming a regular service via EUnet in 1982.[5][6]

The original UUCP was rewritten by AT&T researchers Peter Honeyman, David A. Nowitz, and Brian E. Redman around 1983. The rewrite is referred to as HDB or HoneyDanBer uucp, which was later enhanced, bug fixed, and repackaged as BNU UUCP ("Basic Network Utilities").[7]

Each of these versions was distributed as proprietary software, which inspired Ian Lance Taylor to write a new free software version from scratch in 1991.[8] Taylor UUCP was released under the GNU General Public License. Taylor UUCP addressed security holes which allowed some of the original network worms to remotely execute unexpected shell commands. Taylor UUCP also incorporated features of all previous versions of UUCP, allowing it to communicate with any other version and even use similar config file formats from other versions.

UUCP was also implemented for non-UNIX operating systems, most-notably DOS systems. Packages such as UUSLAVE/GNUUCP (John Gilmore, Garry Paxinos, Tim Pozar), UUPC/extended (Drew Derbyshire of Kendra Electronic Wonderworks) and FSUUCP (Christopher Ambler of IODesign), brought early Internet connectivity to personal computers, expanding the network beyond the interconnected university systems. FSUUCP formed the basis for many bulletin board system (BBS) packages such as Galacticomm's Major BBS and Mustang Software's Wildcat! BBS to connect to the UUCP network and exchange email and Usenet traffic. As an example, UFGATE (John Galvin, Garry Paxinos, Tim Pozar) was a package that provided a gateway between networks running Fidonet and UUCP protocols.

FSUUCP was the only other implementation of Taylor's enhanced 'i' protocol, a significant improvement over the standard 'g' protocol used by most UUCP implementations.[citation needed]

Technology

[edit]

Before the widespread availability of Internet access, computers were only connected by smaller local area networks within a company or organization. They were also often equipped with modems so they could be used remotely from character-mode terminals via dial-up telephone lines. UUCP used the computers' modems to dial out to other computers, establishing temporary, point-to-point links between them. Each system in a UUCP network has a list of neighbor systems, with phone numbers, login names and passwords, etc. When work (file transfer or command execution requests) is queued for a neighbor system, the uucico program typically calls that system to process the work. The uucico program can also poll its neighbors periodically to check for work queued on their side; this permits neighbors without dial-out capability to participate.

Over time, dial-up links were replaced by Internet connections, and UUCP added a number of new link layer protocols. These newer connections also reduced the need for UUCP at all, as newer application protocols developed to take advantage of the new networks. Today, UUCP is rarely used over dial-up links, but is occasionally used over TCP/IP.[9][10] The number of systems involved, as of early 2006, ran between 1500 and 2000 sites across 60 enterprises. UUCP's longevity can be attributed to its low cost, extensive logging, native failover to dialup, and persistent queue management.

Sessions

[edit]

UUCP is normally started by having a user log into the target system and then running the UUCP program. In most cases, this is automated by logging into a known user account used for transfers, whose account's shell has been set to uucico. Thus, for automated transfers, another machine simply has to open a modem connection to the called machine and log into the known account.

When uucico runs, it will expect to receive commands from another UUCP program on the caller's machine and begin a session. The session has three distinct stages:

  1. Initial handshake
  2. File request(s)
  3. Final handshake

Initial handshake

[edit]

On starting, uucico will respond by sending an identification string, \20Shere=hostname\0, where \20 is the control-P character, and \0 is a trailing null. The caller's UUCP responds with \20Scallername options\0, where options is a string containing zero or more Unix-like option switches. These can include packet and window sizes, the maximum supported file size, debugging options, and others.

Depending on the setup of the two systems, the call may end here. For instance, when the caller responds with their system name, the called system may optionally hang up if it does not recognize the caller, sending the RYou are unknown to me\0 response string and then disconnecting.

File requests

[edit]

If the two systems successfully handshake, the caller will now begin to send a series of file requests. There are four types:

S causes a file to be Sent from the caller to the called system (upload). The from and to names are provided, allowing the filename to be changed on the receiver. When the S command is received on the called system, it responds with SY if it succeeded and it is ready to accept the file, or SNx if it failed, where x is a failure code. If an SY is received by the caller, it begins uploading the file using the protocol selected during the initial handshake (see below). When the transfer is complete, the called system responds with CY if it successfully received the file, or CN5 if it failed.
R is a Request for the called system to send a file to the caller (download). It is otherwise similar to S, using RY and RN to indicate the command was accepted and it will begin to send data or had a problem, and expecting a CY and CN5 from the caller at the end of the transfer.
X uploads commands to be eXecuted on the called system. This can be used to make that system call another and deliver files to it. The called system responds with XY if it succeeded, or XN if it failed.
H, for Hangup, indicates the caller is done. The called system responds with HY if it succeeded, or HN if it failed.

Final handshake

[edit]

After sending an H command, the calling system sends a final packet \20OOOOOO\0 (control-P, six ohs, null-terminator) and the called system responds with \20OOOOOO\0 (control-P, seven ohs, null-terminator). Some systems will simply hang up on the successful reception of the H command and not bother with the final handshake.

g-protocol

[edit]

Within the suite of protocols in UUCP, the underlying g-protocol is responsible for transferring information in an error-free form. The protocol originated as a general-purpose system for packet delivery, and thus offers a number of features that are not used by the UUCP package as a whole. These include a secondary channel that can send command data interspersed with a file transfer, and the ability to renegotiate the packet and window sizes during transmission. These extra features may not be available in some implementations of the UUCP stack.[11]

The packet format consisted of a 6-byte header and then between zero and 4096 bytes in the payload. The packet starts with a single \020 (control-P). This is followed by a single byte, known as "K", containing a value of 1 to 8 indicating a packet size from 32 to 4096 bytes, or a 9 indicating a control packet. Many systems only supported K=2, meaning 64 bytes. The next two bytes were a 16-bit checksum of the payload, not including the header. The next byte is the data type and finally, the last byte is the XOR of the header, allowing it to be checked separately from the payload.[11]

The control byte consists of three bit-fields in the format TTXXXYYY. TT is the packet type, 0 for control packets (which also requires K=9 to be valid), 1 for alternate data (not used in UUCP), 2 for data, and 3 indicates a short packet that re-defines the meaning of K. In a data packet, XXX is the packet number for this packet from 0 to 7, and YYY is the last that was received correctly. This provides up to 8 packets in a window. In a control packet, XXX indicates the command and YYY is used for various parameters. For instance, transfers are started by sending a short control packet with TT=0 (control), XXX=7 and YYY the number of packets in a window, then sending another packet with XXX=6 and YYY as the packet length (encoded as it would be in K) and then a third packet that is identical to the first but XXX=5.[11]

g-protocol uses a simple sliding window system to deal with potentially long latencies between endpoints. The protocol allows packets to size from 32 to 4096 8-bit bytes, and windows that include 1 to 7 packets. In theory, a system using 4k packets and 7 packet windows (4096x7) would offer performance matching or beating the best file-transfer protocols like ZMODEM. In practice, many early implementations only supported a single setting of 64x3. As a result, the g-protocol has an undeserved reputation for poor performance. Confusion over the packet and window sizes led to the G-protocol, differing only in that it always used 4096x3. Taylor UUCP did not support G, but did support any valid requested window or packet size, so remote systems starting G would work fine with Taylor's g, while two Taylor systems could negotiate even faster connections.[11]

Telebit modems used protocol spoofing to improve the performance of g-protocol transfers by noticing end-of-packet markers being sent to the remote system and immediately sending an ACK back to the local host, pretending that the remote system had already received the packet and decoded it correctly. This triggered the software stack on the local computer to send the next packet, so rapidly that the transfer became almost continuous. The data between the two modems was error-corrected using a proprietary protocol based on MNP that ran over Telebit's half-duplex connections much better than g-protocol would normally,[11] because in the common 64x3 case the remote system would be sending a constant stream of ACKs that would overflow the low-speed return channel. Combined with the modem's naturally higher data rates, up to 23 kbps, they greatly improved overall throughput and generally performed about seven times the speed of a 2400 bit/s modem.[12] They were widely used on UUCP hosts as they could quickly pay for themselves in reduced long-distance charges.

Other protocols

[edit]

UUCP implementations also include other transfer protocols for use over certain links.

f-protocol is designed to run over 7-bit error-corrected links. This was originally intended for use on X.25 links, which were popular for a time in the 1980s. It does not packetize data, instead, the entire file is sent as a single long string followed by a whole-file checksum. The similar x-protocol appears to have seen little or no use. d-protocol was similar to x, but intended for use on Datakit networks that connected many of Bell Labs offices.[11]

t-protocol originated in the BSD versions of UUCP and like some similar ones, is designed to run over 8-bit error-free TCP/IP links. It has no error correction at all, and the protocol consists simply of breaking up command and file data into 512 or 1024-byte packets to easily fit within typical TCP frames.

e-protocol ("e" for Ethernet) was developed by Clem Cole at MASSCOMP and was widely released by Brian Redman in the later HoneyDanBer versions. It was developed and released before the t-protocol, but the t-protocol was more commonly used because the BSD version of UUCP was the dominant implementation. The e-protocol differs from the t-protocol only in that commands are not packetized and are instead sent as normal strings, while files are padded to the nearest 20 bytes.[11][13]

Mail routing

[edit]
Business card with UUCP email address

The uucp and uuxqt capabilities could be used to send email between machines, with suitable mail user interfaces and delivery agent programs. A simple UUCP mail address was formed from the adjacent machine name, an exclamation mark (often pronounced bang), followed by the user name on the adjacent machine. For example, the address barbox!user would refer to user user on adjacent machine barbox.[14]

Mail could furthermore be routed through the network, traversing any number of intermediate nodes before arriving at its destination. Initially, this had to be done by specifying the complete path, with a list of intermediate host names separated by bangs. For example, if machine barbox is not connected to the local machine, but it is known that barbox is connected to machine foovax which does communicate with the local machine, the appropriate address to send mail to would be foovax!barbox!user.

User barbox!user would generally publish their UUCP email address in a form such as …!bigsite!foovax!barbox!user. This directs people to route their mail to machine bigsite (presumably a well-known and well-connected machine accessible to everybody) and from there through the machine foovax to the account of user user on barbox. Publishing a full path would be pointless, because it would be different, depending on where the sender was. (e.g. Ann at one site may have to send via path gway!tcol!canty!uoh!bigsite!foovax!barbox!user, whereas from somewhere else, Bill has to send via the path pdp10!router22!bigsite!foovax!barbox!user). Many users would suggest multiple routes from various large well-known sites, providing even better and perhaps faster connection service from the mail sender.

Bang path

[edit]

An email address of this form was known as a bang path. Bang paths of eight to ten machines (or hops) were not uncommon in 1981, and late-night dial-up UUCP links could cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. Some hosts went so far as to try to "rewrite" the path, sending mail via "faster" routes—this practice tended to be frowned upon.

The "pseudo-domain" ending .uucp was sometimes used to designate a hostname as being reachable by UUCP networking, although this was never formally registered in the domain name system (DNS) as a top-level domain. The uucp community administered itself and did not mesh well with the administration methods and regulations governing the DNS; .uucp works where it needs to[where?]; some hosts[which?] punt mail out of SMTP queue into uucp queues on gateway machines if a .uucp address is recognized on an incoming SMTP connection.[citation needed]

Usenet traffic was originally transmitted over the UUCP protocol, typically over dialup modems. At each receiving node, each Usenet article's Path header line would have the current node's name prepended to the path, separated by "!". For example, an article that came in from node utzoo to node decvax with Path: utzoo!henry would have that line change to Path: decvax!utzoo!henry). Usenet software would then send a copy of each article to every neighbor node which had been configured to receive the newsgroup(s) that the article had been posted to -- unless that neighbor was already in the Path line. These paths were thus used to ensure that articles did not "loop" back to a node that already had them.

In general, like other older e-mail address formats, bang paths have now been superseded by the "@ notation", even by sites still using UUCP. A UUCP-only site can register a DNS domain name, and have the DNS server that handles that domain provide MX records that cause Internet mail to that site to be delivered to a UUCP host on the Internet that can then deliver the mail to the UUCP site.

UUCPNET and mapping

[edit]

UUCPNET was the name for the totality of the network of computers connected through UUCP. This network was very informal, maintained in a spirit of mutual cooperation between systems owned by thousands of private companies, universities, and so on. Often, particularly in the private sector, UUCP links were established without official approval from the companies' upper management. The UUCP network was constantly changing as new systems and dial-up links were added, others were removed, etc.

The UUCP Mapping Project was a volunteer, largely successful effort to build a map of the connections between machines that were open mail relays and establish a managed namespace. Each system administrator would submit, by e-mail, a list of the systems to which theirs would connect, along with a ranking for each such connection. These submitted map entries were processed by an automatic program that combined them into a single set of files describing all connections in the network. These files were then published monthly in a newsgroup dedicated to this purpose. The UUCP map files could then be used by software such as "pathalias" to compute the best route path from one machine to another for mail, and to supply this route automatically. The UUCP maps also listed contact information for the sites, and so gave sites seeking to join UUCPNET an easy way to find prospective neighbors.

Connections with the Internet

[edit]

Many UUCP hosts, particularly those at universities, were also connected to the Internet in its early years, and e-mail gateways between Internet SMTP-based mail and UUCP mail were developed. A user at a system with UUCP connections could thereby exchange mail with Internet users, and the Internet links could be used to bypass large portions of the slow UUCP network. A "UUCP zone" was defined within the Internet domain namespace to facilitate these interfaces.

With this infrastructure in place, UUCP's strength was that it permitted a site to gain Internet e-mail and Usenet connectivity with only a dial-up modem link to another cooperating computer. This was at a time when true Internet access required a leased data line providing a connection to an Internet Point of Presence, both of which were expensive and difficult to arrange. By contrast, a link to the UUCP network could usually be established with a few phone calls to the administrators of prospective neighbor systems. Neighbor systems were often close enough to avoid all but the most basic charges for telephone calls.

Remote commands

[edit]

uux is remote command execution over UUCP. The uux command is used to execute a command on a remote system, or to execute a command on the local system using files from remote systems. The command is run by the uucico daemon, which handles remote execution requests as simply another kind of file to batch-send to the remote system whenever a next-hop node is available. The remote system will then execute the requested command and return the result, when the original system is available. Both of these transfers may be indirect, via multi-hop paths, with arbitrary windows of availability. Even when executing a command on an always-available neighbor, uux is not instant.

Decline

[edit]

UUCP usage began to die out with the rise of Internet service providers offering inexpensive SLIP and PPP services. The UUCP Mapping Project was formally shut down in late 2000.

The UUCP protocol has now mostly been replaced by the Internet TCP/IP based protocols SMTP for mail and NNTP for Usenet news.

In July 2012, Dutch Internet provider XS4ALL closed down its UUCP service, claiming it was "probably one of the last providers in the world that still offered it"; it had only 13 users at that time (prior to its shut-down it had refused requests from new users for several years).[15]

Current uses and legacy

[edit]

One surviving feature of UUCP is the chat file format, largely inherited by the Expect software package.

UUCP was in use over special-purpose high cost links (e.g. marine satellite links) long after its disappearance elsewhere,[16] and still remains in legacy use.[citation needed] In addition to legacy use, in 2021 new and innovative UUCP uses are growing, especially for telecommunications in the HF band, for example, for communities in the Amazon rainforest for email exchange and other uses. A patch to Ian's UUCP was contributed to UUCP Debian Linux package[17] to adapt for the HERMES (High-Frequency Emergency and Rural Multimedia Exchange System) project, which provides UUCP HF connectivity.[18]

In the mid 2000s, UUCP over TCP/IP (often encrypted, using the SSH protocol[10]) was proposed[according to whom?] for use when a computer does not have any fixed IP addresses but is still willing to run a standard mail transfer agent (MTA) like Sendmail or Postfix.

Bang-like paths are still in use within the Usenet network, though not for routing; they are used to record, in the header of a message, the nodes through which that message has passed, rather than to direct where it will go next.[19] "Bang path" is also used as an expression for any explicitly specified routing path between network hosts. That usage is not necessarily limited to UUCP, IP routing, email messaging, or Usenet.

The concept of delay-tolerant networking protocols was revisited in the early 2000s.[20] Similar techniques as those used by UUCP can apply to other networks that experience delay or significant disruption.

See also

[edit]

References

[edit]
  1. ^ UNIX(TM) TIME-SHARING SYSTEM: UNIX PROGRAMMER'S MANUAL, Seventh Edition, Volume 1 (PDF). Murray Hill, New Jersey: Bell Telephone Laboratories, Incorporated. January 1979. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  2. ^ "Aminet - Search".
  3. ^ McIlroy, M. D. (1987). A Research Unix reader: annotated excerpts from the Programmer's Manual, 1971–1986 (PDF) (Technical report). CSTR. Bell Labs. 139. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  4. ^ "Version 7 Unix manual: "UUCP Implementation Description" by D. A. Nowitz, and "A Dial-Up Network of UNIX Systems" by D. A. Nowitz and M. E. Lesk" (PDF). Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  5. ^ Houlder, Peter (19 January 2007). "Starting the Commercial Internet in the UK" (PDF). 6th UK Network Operators' Forum. Retrieved 2025-08-06.
  6. ^ Reid, Jim (3 April 2007). "Networking in UK Academia ~25 Years Ago" (PDF). 7th UK Network Operators' Forum. Archived from the original (PDF) on 2025-08-06. Retrieved 2025-08-06.
  7. ^ Gary J. Murakami (September 24, 1988). "The History of ihnp4 and The Growth of the Email Network". Archived from the original on September 11, 2013. Retrieved June 7, 2013.
  8. ^ Ian Lance Taylor (September 1991). "Beta release of new UUCP package available". Retrieved 2025-08-06.
  9. ^ Ian Lance Taylor (June 2003). "UUCP 'f' Protocol". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  10. ^ a b Fabien Penso. "UUCPssh". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  11. ^ a b c d e f g Taylor, Ian Lance (8 March 1996). "UUCP Internals Frequently Asked Questions". Archived from the original on 6 November 2019. Retrieved 29 August 2020.
  12. ^ Kirksey, Kenneth (25 December 1991). "What You Need To Know About Modems". Archived from the original on 24 October 2020. Retrieved 29 August 2020. The actual throughput is around 14400 bps.
  13. ^ Talbot, Stephen (February 1988). UUCP Management Guide, Rev C. User Manuals. Massachusetts Computer Corporation.
  14. ^ Cerf, Vint (20 March 2022). "[Internet Policy] Why the World Must Resist Calls to Undermine the Internet". IETF-Discussion (Mailing list). Retrieved 24 March 2022.
  15. ^ Huijbregts, Niels (30 July 2012). "XS4ALL Weblog: Afscheid van UUCP (Goodbye to UUCP)" (in Dutch). XS4ALL. Archived from the original on 31 July 2013.
  16. ^ Randolph Bentson (August 1995). "Linux Goes To Sea". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  17. ^ Rafael Diniz (January 2021). "UUCP 1.07.27-changelog". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  18. ^ Rafael Diniz (January 2021). "High-frequency Emergency and Rural Multimedia Exchange System". Retrieved 2025-08-06.
  19. ^ K. Murchison; C. Lindsey; D. Kohn (November 2009). "Path". Netnews Article Format. IETF. p. 14-16. sec. 3.1.5. doi:10.17487/RFC5536. RFC 5536.
  20. ^ Kevin Fall (August 2003). "A Delay-Tolerant Network Architecture for Challenged Internets". Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03. 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. ACM SIGCOMM. pp. 27–34. doi:10.1145/863955.863960. ISBN 978-1-58113-735-4.
[edit]
枸杞子有什么功效 眉毛尾部有痣代表什么 经常头疼是什么原因引起的 狗消化不良吃什么药 什么都想要
献血证有什么用 糖尿病人可以吃什么 圣诞节送孩子什么礼物好 久卧伤什么 mg是什么单位
吃芒果不能和什么一起吃 葡萄又什么又什么 anker是什么牌子 四川酸菜是什么菜 dr是什么意思
小孩疝气看什么科室 无花果吃了有什么好处 急性阑尾炎什么症状 吃了就吐是什么原因 气胸什么症状
发泄是什么意思hcv8jop4ns1r.cn 眉毛白是什么原因引起的hcv8jop2ns4r.cn 血氧是什么意思hcv9jop1ns8r.cn 序列是什么意思hcv9jop8ns3r.cn 让我随你去让我随你去是什么歌hcv8jop1ns1r.cn
什么什么之财hcv8jop3ns6r.cn 清华校长什么级别beikeqingting.com 碳足迹是什么hcv9jop7ns1r.cn 吃黑豆有什么好处hcv8jop0ns7r.cn 12月是什么星座的hcv9jop8ns3r.cn
鳖孙是什么意思hcv8jop2ns7r.cn 胃糜烂是什么症状huizhijixie.com 春宵一刻值千金是什么意思hkuteam.com 哈密瓜为什么叫哈密瓜hcv8jop0ns4r.cn 什么肉不能吃hcv9jop0ns6r.cn
磷高了会出现什么症状hcv8jop8ns5r.cn 阿姨是什么意思hcv7jop5ns3r.cn 喝完酒吃什么解酒最快hcv7jop9ns6r.cn icicle是什么牌子hcv8jop4ns7r.cn 石加乏念什么hcv7jop6ns4r.cn
百度